Attacker's Dictionary: Auditing Criminal Attacks on Passwords

Tod Beardsley will be sharing the results of a year long data collection program of opportunistic credential scanning data from Heisenberg, Rapid7’s public-facing network of low-interaction honeypots.

Instead of focusing on the type of passwords end users typically pick, this data shows what passwords opportunistic scanners are using in order to test and likely compromise Internet connected point of sale systems, kiosks, and desktop PCs which offer Remote Desktop Protocol service for remote management.

Attacker's Dictionary: Auditing Criminal Attacks on Passwords

Tod Beardsley will be sharing the results of a year long data collection program of opportunistic credential scanning data from Heisenberg, Rapid7’s public-facing network of low-interaction honeypots.

Instead of focusing on the type of passwords end users typically pick, this data shows what passwords opportunistic scanners are using in order to test and likely compromise Internet connected point of sale systems, kiosks, and desktop PCs which offer Remote Desktop Protocol service for remote management.